Quality of Experience in Dense CSMA Networks

Size: px
Start display at page:

Download "Quality of Experience in Dense CSMA Networks"

Transcription

1 IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) Quality of Experience in Dense CSMA Networks Tung-En Wu, Der-Jiunn Deng, and Kwang-Cheng Chen Graduate Institute of Communication Engineering, National Taiwan University Taipei, Taiwan {r94229, ckc}@ntu.edu.tw Department of Computer Science and Information Engineering, National Changhua University of Education Changhua, Taiwan djdeng@cc.ncue.edu.tw Abstract Dense carrier sensing wireless networks are important scenarios to enable ubiquitous mobile Internet access. In this work, we study user experience from the end-to-end performance of dense p-persistent CSMA networks that suffers from operation interference among many non-coordinated APs. Results show that in dense networks, the effective coverage of APs shrinks and most STAs don t receive satisfactory services which renders the network useless. We find that a dense network with multiple non-cooperative APs does not always result in lower latency. The RTS/CTS handshake also does not guarantee better latency than the basic access method in dense networks. For end-to-end throughput and end-to-end drop rate, results show that a dense network with many non-coordinated STAs has poor performance compared to that with few due to high collision, contention, and outage. On the other hand, a dense network covered by multiple APs offers better end-to-end performance compared to one covered by few. The RTS/CTS handshake also brings similar performance enhancement. Appropriate optimization associated with application scenarios are useful. I. INTRODUCTION The variety of information and services on the Internet stimulate growth in the number of mobile devices and the usage of these devices. It is expected that the number of mobile-connected devices will exceed the world s population by 24 and the monthly global mobile data traffic will surpass 5 exabytes by 28 []. In order to meet the needs for connections at anytime and anywhere, wireless Local Area Networks (WLANs) based on the IEEE 82. standards have become popular and are expected to be deployed in environments characterized by a high density of STAs or BSSs such as hotspots in airport/train stations, malls, stadium, campus. Most of these environments are also characterized by the overlap, in the same area, of multiple Wi-Fi networks that need to cohabit efficiently and fairly. How to improve user experience in dense networks by a fair and efficient sharing of throughput among all users/applications and to increase area capacity becomes an important topic. To fully comprehend the impacts of dense deployment of APs, we look into the performance of CSMA as it serves the fundamental mechanism of IEEE 82. MAC. We particularly focus on the quality of experience (QoE) in this new study, following many efforts in the past. [2] improves the resolution mechanism of CSMA/CA, specifically IEEE 82. MAC, by modifying the contention window and backoff counter update rules. In [3], [4], [5], random access Fig. : IEEE 82. MAC overhead. polling (RAP) and its variants are proposed as a multiple access protocol for multi-cell wireless networks. They are also effective mechanisms to resolve contention and collision overheads. In [6], an adaptive CCA scheme based on the local SINR is proposed to improve spatial reuse and to increase the aggregate network throughput in 82. mesh networks. In [7], a heuristic algorithm that dynamically tunes the CCA threshold is proposed for QoS provisioning in a homogeneous network. Most of the previous works aim at solving the resource allocation problem in dense networks. However, few works are dedicated to understand the problems themselves in dense CSMA networks which are the main focus of this paper. The organization of the paper is as follows: In section II, we review issues in dense p-persistent CSMA networks. Section III gives our simulation settings used to evaluate the performance. Section IV gives the simulation results and discussions. Section V concludes this paper. II. IEEE 82. ISSUES IN DENSE NETWORKS There are three main dense scenarios: dense STA (i.e. high number of associated STAs per AP), dense AP (i.e. high density deployment of APs), or combined. In the following, we will look at issues of 82. MAC protocol in each of these dense scenarios. Fig. shows a typical transmission period of an 82. device. There are three main overheads associated with the protocol: the contention overhead, the management overhead and the feedback overhead. For a single dense BSS, collisions and contentions are the major causes of performance degradation. The 82. protocol defines the binary exponential backoff (BEB) mechanism /5/$3. 25 IEEE 759

2 IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) (a) CCI in the uplink. (b) CCI in the downlink. Fig. 2: CCI in high density deployment of APs. to resolve collisions when they happen. However, the BEB mechanism resets the contention window (CW) size whenever a packet is successfully transmitted which creates unnecessary future collisions when the number of contending STAs is large. There have been many works on solving this problem [8], [9], []. Besides the contention overhead, the management frames (e.g. probe request/responses, association/reassociation frame) also consume a large fraction of the available bandwidth when there is a large number of STAs coming and leaving the network. Last, the feedback overhead that is used to notify the transmitters about the successful reception of packets also increases with the number of STA/AP. Among the three types of overhead, we will focus on the contention overhead as it is a major performance limiting factor in a dense STA/AP environment. When more than one dense BSS are closely deployed, co-channel interference (CCI) causes additional performance degradation. An example is given in Fig. 2. In Fig. 2a, the uplink transmission of STA is prohibited by the downlink transmission of a co-channel AP 2 of BSS 2. This is similar to the well-known exposed terminal problem. In Fig. 2b, the downlink reception of STA is interfered by the downlink transmission of a co-channel AP 2 of BSS 2. Similar phenomenon can be observed with more overlapped BSS. These two CCI problems exist in every wireless network, however, they are most prominent in dense network scenarios. Since the APs/STAs are in close proximity of each other in dense environment, there will be less signal attenuation due to path loss and fading, and the CCI will affect the performance more seriously. Moreover, since only limited non-overlapping channels are available, and there are usually no coordination among or centralized control over the APs, CCI is inevitable in dense environment. Due to the above limitations, increasing the throughput per user in dense CSMA networks becomes a challenging work. One way to improve performance in such dense environment is to increase spatial reuse and hence the number of simultaneous transmissions. In a CSMA network, the spatial reuse is primarily determined by the physical carrier sensing (PCS) mechanism: a user attempting to transmit must sample the energy in the channel first; if the sampled energy is below a threshold, known as the physical carrier sensing (PCS) threshold, the user gains the right to transmit. Due to the wireless propagation properties, PCS is usually accompanied with two problems: the hidden terminal problem and the exposed terminal problem. The hidden terminal problem increases the packet loss rate while the exposed terminal problem reduces spatial reuse in the network. PCS threshold is the key para that determines the tradeoff between the two problems: higher PCS threshold reduces exposed terminal but increases the probability for hidden terminals; on the other hand, lower PCS threshold reduces hidden terminal collisions at the cost of increasing exposed terminals. Finding the optimal PCS threshold has been the focus of many recent works [], [2]. In the past, most data transmissions are on the downlink. With the emergence of new applications, e.g. user generated content upload, interactive multimedia and gaming and wearable devices, there are more traffic in the uplink and the uplink performance becomes the limiting factor for user experience [3]. As a result, we will focus on evaluating the uplink performance in dense networks. Moreover, since the IEEE 82. MAC protocol are based on CSMA/CA which is a refinement of p-persistent CSMA, and to make our results more general and applicable to other CSMA-based protocols, we will specifically consider uplink performance in dense networks with p-persistent CSMA protocol. III. SIMULATION SETTINGS We evaluate the performance of p-persistent CSMA networks with and without the RTS/CTS handshaking. The values of the paras used for the simulations are summarized in Table I. In our simulation, STAs are uniformly scattered in a 2 2 square area. The APs are deployed in a planned manner similar to a lattice structure. An example of our network topology is shown in Fig. 3. The APs are deployed in the way such that all STAs are covered by at least one AP. All STAs are assumed to associate with the AP that has the strongest mean received signal strength. The scenarios where the STAs and APs are deployed in a non-uniform and nonsymmetric way are left for future study. We assume all data packets arrived at the source at constant interval and are destined for a destination two-hop away. We assume a slotted channel and all transmission are synchronized to start at the beginning of each slot. All STAs start from the idle state and transit into the carrier sensing state once data arrive at the STAs. The carrier sensing is done using an energy detector in our simulation. A STA must make sure the channel is idle before it can transmit its packet. The channel is considered idle by a STA if the energy at the STA is lower 76

3 IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) TABLE I: Simulation para settings RTS Length 2 slots CTS Length 2 slots Data Length slots ACK length 2 slots CTS Timeout 2 slots ACK Timeout 2 slots p /32 Retry Limit 6 Mean arrival rate per user. Data/slot CCAT threshold η -82 dbm SIR threshold ρ 6 db m R c STA AP m Fig. 3: Simulation network topology: 4 AP case. than a threshold η whose value is given in Table I. In the basic mode, a STA will transmit a Data packet in an idle slot with probability p 2 m where m is the number of times that the Data packet has been retransmitted. In the RTS/CTS mode, a transmitter will first transmit a RTS with probability p 2 m when it senses an idle slot and wait for the CTS replied by its receiver. Only when the CTS packet is successfully received at the transmitter will it start transmitting its Data packet. If the CTS is not received after a CTS Timeout, or the CTS is received in error due to outage, the transmitter increment m by one and tries again in the next idle slot. A Data packet is retransmitted only if the transmitter does not receive the corresponding ACK within ACK Timeout or the ACK is received in error. A packet is received in outage (error) if at any time slot during the transmission period, the SINR at the receiver is lower than a threshold ρ. A Data packet is dropped if it is not successfully received after Retry Limit times of re-transmissions. The channel model we used in our simulation is given equation and 2. This model is typically used to model LOS conditions in a large open space indoor or an outdoor environment. { 2log(d), d P L(d) = () log(d/), d > { N(, 3 X σ = 2 ), d N(, 5 2 (2) ), d > The performance metrics used in our work is given as follows: ) End-to-end Throughput The end-to-end throughput is defined as the ratio between the number of successful received packet at the destination and the total number of transmissions at the source in a given interval. 2) Latency The latency of a packet is an end-to-end version of delay and is defined as the time between its arrival at the source and its successful reception at the destination. Latency consists of the following components: the propagation delay, the node processing delay, the transmission delay, the queueing delay. Latency counts these delay components over all transmitter and receiver pair on the path that a packet take through from the source to the destination. It is obvious that latency strongly depends on the routing algorithm and the hop number. Since we consider two hop case, the effect of routing will be negligible and will be neglected in our simulation. In our simulation, a source is always a STA, a relay is always an AP, and a destination is always a STA. 3) End-to-end Drop rate The drop rate is defined as the ratio of the number of dropped packet over the total number of transmitted packets in a given interval. A packet is dropped if it is not successfully received for more than Retry Limit times. A. End-to-end Throughput IV. PERFORMANCE EVALUATION Fig. 4 shows the mean end-to-end throughput for each position in each of the 4 APs coverage. The value at each point is an average over all possible destinations for packets from a source at this point. We can see that the AP at the center, surrounded by the other APs, suffers lower throughput compared to the other APs due to higher collision, interference, and outage probability. STAs that are associated with the center AP suffer lower throughput than the others. Fig. 5 gives the mean end-to-end throughput for a different number of APs and STAs. It is obvious from the result that for fix number of APs, the throughput degrades with increasing number of STAs which is due to more collision, contention, and interference. On the other hand, for a fix number of STAs, increasing the number of APs effectively improves the mean throughput performance. This is not only because the contentions are shared among the APs but also because denser deployment of APs improves the SIR performance. STAs are closer to their associated APs in a dense AP environment and hence the received signal strength at the AP is stronger. Also, in our simulation, APs act only as relays and do not have their own packets to transmit hence increasing the number of APs does not increase the interference for the other APs. This assumption is of course not true in other network settings where APs may have their own packets to transmit. In those cases, the improvement in received signal with denser APs may be compromised by the additional interference from more transmitting APs. It is also clear from Fig. 5 that the RTS/CTS handshake significantly improves the end-to-end throughput performance. This is because the handshaking forces the STAs 76

4 IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) End-to-end Throughput.25.9 Effective throughput coverage: 9APs end-to-end throughput STA(basic access) 8 STA(basic access) 2 STA(basic access) 4 STA(rts/cts) 8 STA(rts/cts) 2 STA(rts/cts) throughput Fig. 6: End-to-end throughput coverage under different number of STAs Fig. 4: End-to-end throughput distribution in each AP coverage: 4 APs, 8 STAs case Effective throughput coverage: 8STAs End-to-end Throughput End-to-end Throughput 4 AP: basic access 9 AP: basic access 6 AP: basic access 4 AP: rts/cts 9 AP: rts/cts 6 AP: rts/cts AP(basic access) 9 AP(basic access) 6 AP(basic access) 4 AP(rts/cts) 9 AP(rts/cts) 6 AP(rts/cts) throughput Fig. 7: End-to-end throughput coverage under different number of APs Number of stations Fig. 5: Mean end-to-end throughput under different number of APs/STAs. to be more conservative in accessing the channel and hence all STAs suffer less collision and outage. Although being more conservative, less collision and interference significantly increases the success probability and the throughput performance. Fig. 6, 7 show the end-to-end throughput coverage under various number of STAs and APs respectively. Each curve is a summarize of 4. The y-axis coverage value gives the percentage of the area at which the mean throughput is larger than or equal to the x-axis value. It is clear from the results that as the number of STAs gets larger, the coverage curve is shifted to the left and more points experience low mean throughput. The RTS/CTS handshake helps improve the throughput performance as the coverage curve is shifted to the right. B. Latency Fig. 8 shows the mean latency for each position in each of the 4 APs coverage. The value at each point is an average over all possible destinations for packets from a source at this point. We see that the AP at the center, surrounded by the other APs, suffers high latency compared to the other APs. This is consistent with the throughput result in Fig. 8 where high latency corresponds to low end-to-end throughput. Note that low throughput may be caused by either high drop rate or high latency. As a result, areas with low throughput do not always imply high latency. The areas in dark blue, with latency close to zero, also has low throughput, as can be seen in Fig. 8 and 4. However, this area suffers high drop rate as will be shown in the next subsection. Fig. 9 gives the mean end-to-end latency for different number of APs and STAs. For the basic access, a network with more APs has lower mean latency when the number of STAs is low. As the number of STAs grows, the mean latency is greatest for the network with more APs. This is because more APs allow more concurrent transmission and the signal strength on a busy channel is higher. Hence STAs are more likely to sense a busy channel and avoid colliding on it. Being more conservative, the drop rate, shown in next subsection, will be lower at the cost of higher latency. For the RTS/CTS case, we see that a network with 6 APs has lower latency than that with 9 APs. This is because the received SINR value is in general lower in the 9 AP case than that in the 6 AP case due to smaller distance between the STA and the AP hence a higher chance to experience outage. Moreover, the RTS/CTS handshake is effective in reducing the latency when the number of STAs is not large due to the reduction of outage. However, as the number of STAs grows, adding RTS/CTS handshakes causes higher latency due to longer postponement to the RTS/CTS messages. Fig., show the latency coverage under various number 762

5 IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) Latency Effective latency coverage: 8STAs 4 AP(basic access) 9 AP(basic access) 6 AP(basic access) 4 AP(rts/cts) 9 AP(rts/cts) 6 AP(rts/cts) latency(slots) latency(slots) -4 3 Fig. : Latency coverage under different number of APs End-to-end Drop Rate Fig. 8: Latency distribution in each AP coverage: 4 AP, 8 STAs case. Latency(slots) AP: basic access 9 AP: basic access 6 AP: basic access 4 AP: rts/cts 9 AP: rts/cts 6 AP: rts/cts Latency end-to-end drop rate Number of stations Fig. 9: Mean latency under different number of APs/STAs Fig. 2: End-to-end drop rate distribution in each AP coverage: 4 AP, 8 STAs case..75 of STAs and APs respectively. Each curve is a summarize of Fig. 8. The y-axis coverage value gives the percentage of the area at which the mean latency is larger than or equal to the x-axis value. C. End-to-end Drop Rate Fig. 2 shows the mean end-to-end drop rate for each position in each of the 4 APs coverage. The value at each point is an average over all possible destinations for packets from a source at this point. We see that the STAs associated to the center AP suffer higher drop rate than those associated to the peripheral APs. These STAs experience higher collision, Effective latency coverage: 9APs 4 STA(basic access) 8 STA(basic access) 2 STA(basic access) 4 STA(rts/cts) 8 STA(rts/cts) 2 STA(rts/cts) latency(slots) Fig. : Latency coverage under different number of STAs. contention, and lower SINR because they or their receivers are under the coverage of more APs than the others. Fig. 3 gives the mean end-to-end drop rate for different number of APs and STAs. It is obvious from the result that the drop rate increases with increasing number of STAs which is due to more collision, contention, and interference. On the other hand, drop rate decreases with increasing number of APs because the STA is closer to the associated AP and the SINR is improved. Note again that, in our simulation, APs act only as relays and do not have their own packets to transmit hence increasing the number of APs does not increase the interference to the other APs too much. It is also clear that the RTS/CTS handshake significantly improves the end-to-end drop rate due to less collision and interference. Fig. 4 and 5 show the end-to-end drop rate coverage under various number of STAs and APs respectively. The y- axis coverage value gives the percentage of the area at which the mean drop rate is larger than or equal to the x-axis value. These figures confirm our previous statements that dense APs and RTS/CTS handshake improves the end-to-end drop rate performance while dense STAs deteriorates it. 763

6 IEEE ICC 25 - Workshop on Quality of Experience-based Management for Future Internet Applications and Services (QoE-FI) End-to-end Drop Rate AP: basic access 9 AP: basic access 6 AP: basic access 4 AP: rts/cts 9 AP: rts/cts 6 AP: rts/cts End-to-end Drop Rate Number of stations Fig. 3: Mean end-to-end drop rate under different number of APs/STAs Effective drop rate coverage: 9APs 4 STA(basic access) 8 STA(basic access) 2 STA(basic access) 4 STA(rts/cts) 8 STA(rts/cts) 2 STA(rts/cts) drop rate Fig. 4: End-to-end drop rate coverage under different number of STAs. V. CONCLUSION Dense carrier sensing wireless networks are important scenarios to enable ubiquitous mobile Internet access. In this work, we study user experience from the end-to-end performance of dense p-persistent CSMA networks that suffers from operation interference among many non-coordinated APs. Results show that in dense networks, the effective coverage of APs shrinks and most STAs don t receive satisfactory services which renders the network useless. We find that a dense network with multiple non-cooperative APs does not always results in lower latency. The RTS/CTS handshake also does not guarantee better latency than the basic access method in dense networks. For end-to-end throughput and end-to-end drop rate, results show that a dense network with many noncoordinated STAs has poor performance compared to that with Effective drop rate coverage: 8STAs 4 AP(basic access) 9 AP(basic access) 6 AP(basic access) 4 AP(rts/cts) 9 AP(rts/cts) 6 AP(rts/cts) few due to high collision, contention, and outage. On the other hand, a dense network covered by multiple APs offers better end-to-end performance compared to one covered by few. The RTS/CTS handshake also brings similar performance enhancement. Appropriate optimization associated with application scenarios are useful. REFERENCES [] Cisco visual networking index: Global mobile data traffic forecast update, 23v28, Internet: collateral/service-provider/visual-networking-index-vni/white paper c html, Feb. 24, [Dec. 3, 24]. [2] Y. Kwon, Y. Fang, and H. Latchman, A novel mac protocol with fast collision resolution for wireless lans, in INFOCOM 23. Twenty- Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol. 2, March 23, pp vol.2. [3] K.-C. Chen and C.-H. Lee, Rap-a novel medium access control protocol for wireless data networks, in Global Telecommunications Conference, 993, including a Communications Theory Mini-Conference. Technical Program Conference Record, IEEE in Houston. GLOBECOM 93., IEEE, Nov 993, pp vol.3. [4], Group randomly addressed polling for multicell wireless data networks, in Communications, 994. ICC 94, SUPERCOMM/ICC 94, Conference Record, Serving Humanity Through Communications. IEEE International Conference on, May 994, pp vol.2. [5] M.-C. Li and K.-C. Chen, Grapo - ptimized group randomly addressed polling for wireless data network, International Journal of Wireless Information Networks, vol. 2, no. 4, pp , 995. [Online]. Available: [6] J. Zhu, X. Guo, L. Lily Yang, W. Steven Conner, S. Roy, and M. M. Hazra, Adapting physical carrier sensing to maximize spatial reuse in 82. mesh networks: Research articles, Wirel. Commun. Mob. Comput., vol. 4, no. 8, pp , Dec. 24. [Online]. Available: [7] Y. Zhu, Q. Zhang, Z. Niu, and J. Zhu, On optimal qos-aware physical carrier sensing for ieee 82. based wlans: Theoretical analysis and protocol d esign, Wireless Communications, IEEE Transactions on, vol. 7, no. 4, pp , April 28. [8] D.-J. Deng, C.-H. Ke, H.-H. Chen, and Y.-M. Huang, Contention window optimization for ieee 82. dcf access control, Wireless Communications, IEEE Transactions on, vol. 7, no. 2, pp , December 28. [9] F. Cali, M. Conti, and E. Gregori, Ieee 82. protocol: design and performance evaluation of an adaptive backoff mechanism, Selected Areas in Communications, IEEE Journal on, vol. 8, no. 9, pp , Sept 2. [] H. Ma and S. Roy, Contention window and transmission opportunity adaptation for dense ieee 82. wlan based on loss differentiation, in Communications, 28. ICC 8. IEEE International Conference on, May 28, pp [] X. Yang and N. Vaidya, On physical carrier sensing in wireless ad hoc networks, in INFOCOM th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 4, March 25, pp vol. 4. [2] H. Ma, R. Vijayakumar, S. Roy, and J. Zhu, Optimizing 82. wireless mesh networks based on physical carrier sensing, Networking, IEEE/ACM Transactions on, vol. 7, no. 5, pp , Oct 29. [3] K.-C. Chen, Medium access control of wireless lans for mobile computing, Network, IEEE, vol. 8, no. 5, pp. 5 63, Sept drop rate Fig. 5: End-to-end drop rate coverage under different number of APs. 764

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs Ghazale Hosseinabadi and Nitin Vaidya Department of ECE and Coordinated Science Lab. University of Illinois at Urbana-Champaign

More information

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF

A Backoff Algorithm for Improving Saturation Throughput in IEEE DCF A Backoff Algorithm for Improving Saturation Throughput in IEEE 80.11 DCF Kiyoshi Takahashi and Toshinori Tsuboi School of Computer Science, Tokyo University of Technology, 1404-1 Katakura, Hachioji, Tokyo,

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network

A Comparative Analysis on Backoff Algorithms to Optimize Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.771

More information

AGOOD medium access control (MAC) protocol for wireless

AGOOD medium access control (MAC) protocol for wireless IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 3, MAY 2004 793 Design of MAC Protocols With Fast Collision Resolution for Wireless Local Area Networks Younggoo Kwon, Yuguang Fang, Senior Member,

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm

Analysis of Throughput and Energy Efficiency in the IEEE Wireless Local Area Networks using Constant backoff Window Algorithm International Journal of Computer Applications (975 8887) Volume 6 No.8, July Analysis of Throughput and Energy Efficiency in the IEEE 8. Wireless Local Area Networks using Constant backoff Window Algorithm

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks

Empirical Study of Mobility effect on IEEE MAC protocol for Mobile Ad- Hoc Networks Empirical Study of Mobility effect on IEEE 802.11 MAC protocol for Mobile Ad- Hoc Networks Mojtaba Razfar and Jane Dong mrazfar, jdong2@calstatela.edu Department of Electrical and computer Engineering

More information

Collisions & Virtual collisions in IEEE networks

Collisions & Virtual collisions in IEEE networks Collisions & Virtual collisions in IEEE 82.11 networks Libin Jiang EE228a project report, Spring 26 Abstract Packet collisions lead to performance degradation in IEEE 82.11 [1] networks. The carrier-sensing

More information

Wireless LAN -Architecture

Wireless LAN -Architecture Wireless LAN -Architecture IEEE has defined the specifications for a wireless LAN, called IEEE 802.11, which covers the physical and data link layers. Basic Service Set (BSS) Access Point (AP) Distribution

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

Fu-Yi Hung ALL RIGHTS RESERVED

Fu-Yi Hung ALL RIGHTS RESERVED 009 Fu-Yi Hung ALL RIGHTS RESERVED PERFORMANCE ANALYSIS OF THE IEEE 80.-BASED WIRELESS NETWORKS IN THE PRESENCE OF HIDDEN STATIONS by FU-YI HUNG A Dissertation submitted to the Graduate School-New Brunswick

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

Wireless Communication and Networking CMPT 371

Wireless Communication and Networking CMPT 371 Wireless Communication and Networking CMPT 371 Wireless Systems: AM, FM Radio TV Broadcast Satellite Broadcast 2-way Radios Cordless Phones Satellite Links Mobile Telephony Systems Wireless Local Loop

More information

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 An Analytical Approach: Bianchi Model 2 Real Experimentations HoE on IEEE 802.11b Analytical Models Bianchi s Model Simulations ns-2 3 N links with the

More information

CSE 461: Wireless Networks

CSE 461: Wireless Networks CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network

More information

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Dynamic Power Control MAC Protocol in Mobile Adhoc Networks Anita Yadav Y N Singh, SMIEEE R R Singh Computer Science and Engineering Electrical Engineering Computer Science and Engineering Department Department

More information

Coexistence Issues in Contention-Based Heterogeneous Wireless Networks

Coexistence Issues in Contention-Based Heterogeneous Wireless Networks KSII The first International Conference on Internet (ICONI) 2010, December 2010 1 Coexistence Issues in Contention-Based Heterogeneous Wireless Networks Eun-Chan Park 1, Minjoong Rim 1, Hwangnam Kim 2,

More information

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks

Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Directional Antenna based Time Division Scheduling in Wireless Ad hoc Networks Li Shaohua and Dong-Ho Cho School of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks

Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Cooperative Communication Protocol based on Relay Node Grouping in Wireless Networks Sunmyeng Kim Department of Computer Software Engineering, Kumoh National Institute of Technology 1 Daehak-ro, Gumi,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment

A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment 05 Third International Conference on Artificial Intelligence, Modelling and Simulation A Novel Contention Window Control Scheme Based on a Markov Chain Model in Dense WLAN Environment Yoshiaki Morino,

More information

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs

A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs A Hybrid Distributed Coordination Function for Scalability and Inter-operability in Large-scale WLANs Nakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi and Taekyoung Kwon School of Computer Science

More information

Survey on OFDMA based MAC Protocols for the Next Generation WLAN

Survey on OFDMA based MAC Protocols for the Next Generation WLAN Survey on OFDMA based MAC Protocols for the Next Generation WLAN Bo Li, Qiao Qu, Zhongjiang Yan, and Mao Yang School of Electronics and Information Northwestern Polytechnical University, Xi an, China Email:

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

ECE442 Communications Lecture 3. Wireless Local Area Networks

ECE442 Communications Lecture 3. Wireless Local Area Networks ECE442 Communications Lecture 3. Wireless Local Area Networks Husheng Li Dept. of Electrical Engineering and Computer Science Spring, 2014 Wireless Local Networks 1 A WLAN links two or more devices using

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Performance Analysis for Channel Utilization in Wireless LAN

Performance Analysis for Channel Utilization in Wireless LAN Performance Analysis for Channel Utilization in Wireless LAN Shweta Singh Naresh Chandra Arun Kumar Tripathi ABSTRACT Wireless network plays an important role in field of communication. Now a days people

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

Data and Computer Communications. Chapter 13 Wireless LANs

Data and Computer Communications. Chapter 13 Wireless LANs Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer

More information

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

On exploiting spatial reuse in wireless ad hoc networks

On exploiting spatial reuse in wireless ad hoc networks University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2008 On exploiting spatial reuse in wireless ad hoc networks Ziguang

More information

Resource Allocation in Contention-Based WiFi Networks

Resource Allocation in Contention-Based WiFi Networks The 2011 Santa Barbara Control Workshop Resource Allocation in Contention-Based WiFi Networks Laura Giarré Universita di Palermo (giarre@unipa.it) Joint works with I. Tinnirello (Università di Palermo),

More information

IEEE802.11k Enabled Adaptive Physical Carrier Sense Mechanism for Wireless Networks (K-APCS)

IEEE802.11k Enabled Adaptive Physical Carrier Sense Mechanism for Wireless Networks (K-APCS) IEEE82.11k Enabled Adaptive Physical Carrier Sense Mechanism for Wireless Networks (K-APCS) Christina Thorpe School of Computer Science and Informatics University College Dublin Belfield, Dublin 4 Sean

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Medium Access Control

Medium Access Control Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.

More information

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks

E-BEB Algorithm to Improve Quality of Service on Wireless Ad-Hoc Networks Research Journal of Applied Sciences, Engineering and Technology 4(7): 807-812, 2012 ISSN: 2040-7467 Maxwell Scientific Organization, 2012 Submitted: vember 10, 2011 Accepted: December 09, 2011 Published:

More information

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs

Adaptive Fair Channel Allocation for QoS Enhancement in IEEE Wireless LANs Adaptive Fair Channel Allocation for QoS Enhancement in IEEE 82.11 Wireless LANs Mohammad Malli, Qiang Ni, Thierry Turletti, Chadi Barakat Projet Planète, INRIA-Sophia Antipolis, France E-mail: mmalli,

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

Multiple Access in Cellular and Systems

Multiple Access in Cellular and Systems Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks

Numerical Analysis of IEEE Broadcast Scheme in Multihop Wireless Ad Hoc Networks Numerical Analysis of IEEE 802.11 Broadcast Scheme in Multihop Wireless Ad Hoc Networks Jong-Mu Choi 1, Jungmin So 2, and Young-Bae Ko 1 1 School of Information and Computer Engineering Ajou University,

More information

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II Introduction to Wireless Networking CS 490WN/ECE 401WN Winter 2007 Lecture 4: Wireless LANs and IEEE 802.11 Part II This lecture continues the study of wireless LANs by looking at IEEE 802.11. I. 802.11

More information

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks

Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks 2013 IEEE Wireless Communications and Networking Conference (WCNC): MAC Coordinated Dynamic Physical Carrier Sensing based on Local Optimization in Wireless Ad hoc Networks XinMing Zhang, Guoqing Qiu,

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.

More information

Lecture 16: QoS and "

Lecture 16: QoS and Lecture 16: QoS and 802.11" CSE 123: Computer Networks Alex C. Snoeren HW 4 due now! Lecture 16 Overview" Network-wide QoS IntServ DifServ 802.11 Wireless CSMA/CA Hidden Terminals RTS/CTS CSE 123 Lecture

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless CSCD 433 Network Programming Fall 2016 Lecture 7 Ethernet and Wireless 802.11 1 Topics 802 Standard MAC and LLC Sublayers Review of MAC in Ethernet MAC in 802.11 Wireless 2 IEEE Standards In 1985, Computer

More information

Interference avoidance in wireless multi-hop networks 1

Interference avoidance in wireless multi-hop networks 1 Interference avoidance in wireless multi-hop networks 1 Youwei Zhang EE228A Project Report, Spring 2006 1 Motivation Wireless networks share the same unlicensed parts of the radio spectrum with devices

More information

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang

CARA: Collision-Aware Rate Adaptation for IEEE WLANs. Presented by Eric Wang CARA: Collision-Aware Rate Adaptation for IEEE 802.11 WLANs Presented by Eric Wang 1 Outline Introduction Related Work Preliminaries CARA Performance Evaluation Conclusion and Future Work 2 Basic CSMA/CA

More information

A Survey on Modified RTS/CTS Mechanism

A Survey on Modified RTS/CTS Mechanism A Survey on Modified RTS/CTS Mechanism Prachi Srivastava Computer Science and Engineering, MMMEC, Gorakhpur prachi.srivastava.itm@gmail.com Dayashankar Singh Computer Science and Engineering, MMMEC, Gorakhpur

More information

Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks

Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks Kamal Rahimi Malekshan, Student member, IEEE, Weihua Zhuang, Fellow, IEEE and Yves Lostanlen, Senior member,

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Lesson 2-3: The IEEE x MAC Layer

Lesson 2-3: The IEEE x MAC Layer Module 2: Establishing Wireless Connectivity Lesson 2-3: The IEEE 802.11x MAC Layer Lesson Overview This lesson describes basic IEEE 802.11x MAC operation, beginning with an explanation of contention schemes

More information

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN

Project Report: QoS Enhancement for Real-Time Traffic in IEEE WLAN Project Report: QoS Enhancement for Real-Time Traffic in IEEE802.11 WLAN Abstract A key issue in IEEE802.11 WLAN MAC is how to provide QoS support, especially for time-bounded traffic. Although much work

More information

Rahman 1. Application

Rahman 1. Application Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks

A Multi-channel MAC Protocol for Ad Hoc Wireless Networks A Multi-channel MAC Protocol for Ad Hoc Wireless Networks Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Email: jso1@uiuc.edu Nitin

More information

Logical Link Control (LLC) Medium Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC) Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Multichannel Outage-aware MAC Protocols for Wireless Networks

Multichannel Outage-aware MAC Protocols for Wireless Networks Submitted - the 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 29) Multichannel Outage-aware MAC Protocols for Wireless Networks Hyukjin Lee and Cheng-Chew Lim School of Electrical

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Figure.2. Hidden & Exposed node problem

Figure.2. Hidden & Exposed node problem Efficient Throughput MAC Protocol in Ad-hoc Network s Rahul Mukherjee, HOD and Assistant Professor, Electronics & Communication Department, St. Aloysius Institute of Technology (SAIT), Jabalpur, Rajiv

More information

MAC protocols for ad hoc networks

MAC protocols for ad hoc networks MAC protocols for ad hoc networks Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2756/ OUTLINE: Problems for MAC to deal with; Design goals; Classification of

More information

Performance Evaluation of e over Multihop WiFi Mesh Networks

Performance Evaluation of e over Multihop WiFi Mesh Networks Performance Evaluation of 802.11e over Multihop WiFi Mesh Networks Kuo-Lun Hua and Ray-Guang Cheng Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan,

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Evaluation of the backoff procedure of Homeplug MAC vs. DCF

Evaluation of the backoff procedure of Homeplug MAC vs. DCF Evaluation of the backoff procedure of Homeplug MAC vs. DCF Cristina Cano and David Malone Hamilton Institute National University of Ireland, Maynooth Co. Kildare, Ireland Email: {cristina.cano,david.malone}@nuim.ie

More information

Wireless Networks (MAC)

Wireless Networks (MAC) 802.11 Wireless Networks (MAC) Kate Ching-Ju Lin ( 林靖茹 ) Academia Sinica 2016.03.18 CSIE, NTU Reference 1. A Technical Tutorial on the IEEE 802.11 Protocol By Pablo Brenner online: http://www.sss-mag.com/pdf/802_11tut.pdf

More information

High Performance Distributed Coordination Function for Wireless LANs

High Performance Distributed Coordination Function for Wireless LANs High Performance Distributed Coordination Function for Wireless LANs Haithem Al-Mefleh and J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University, Ames, IA 511, USA {almehai,morris}@iastate.edu

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #10 MAC Layer Misbehavior Announcements I'll be in Pittsburgh Feb 28-29 If you or your project team would like to meet, email me to schedule

More information

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Wireless and Mobile Networks 7-2

Wireless and Mobile Networks 7-2 Wireless and Mobile Networks EECS3214 2018-03-26 7-1 Ch. 6: Wireless and Mobile Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers (5-to-1)! # wireless Internet-connected

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations

A Performance Analysis of IEEE Networks in the Presence of Hidden Stations A Performance Analysis of IEEE 802.11 Networks in the Presence of Hidden Stations Marek Natkaniec, Andrzej R. Pach University of Mining and Metallurgy, Department of Telecommunications, Cracow, Poland

More information

Effect of Fragmentation in WLAN Systems with Interference Problems

Effect of Fragmentation in WLAN Systems with Interference Problems Effect of Fragmentation in WLAN Systems with Interference Problems Shakil Akhtar College of Information Technology UAE University s.akhtar@uaeu.ac.ae Abstract Results from simulation model of an 802.11

More information